International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News item: 30 May 2014

Marko Carić
ePrint Report ePrint Report
The modification of message that meets the sufficient conditions for

collision is found in the last step of differential attack proposed

by Wang et all. (2005) on MD4 hash algorithm. Here we show how this

attack phase, finding a collision starting from the list of

sufficient conditions for the collision, can be implemented using a

combination of two algorithms - evolutionary algorithm and hill

climbing. Hybridization of evolutionary algorithm and hill climbing

is a well-known technique for improving solutions, but it isn\'t

applied to this domain (at least by information that author has

collected).

Expand

Additional news items may be found on the IACR news page.